Category Archive: Bachelor Project

Current proposals Bachelor projects. These proposals are only for students of the Université Libre de Bruxelles (ULB).

Oct 07

Implémentation de rewarding smart contracts sur Ethereum

Implementation sur Ethereum d’un smart contract qui donne une récompense pour résoudre un problème ouvert mathématique.

Contacts :  Stefan Langerman <stefan.langerman@ulb.ac.be> et Olivier Markowitch <olivier.markowitch@ulb.ac.be>

Oct 07

Implémentation d’une monnaie électronique locale

Implémentation d’une “crypto-currency” basée sur une bock-chain et sur les signatures produites par la carte d’identité (BeID).

Contacts :  Stefan Langerman <stefan.langerman@ulb.ac.be> et Olivier Markowitch <olivier.markowitch@ulb.ac.be>

Oct 07

Les codes de Huffman adaptatifs

Comparaison des implantations possible et des complexités théorique et
effective.
Comparaison des algorithmes FGK et Lamda.

Contacts: Yves Roggeman

Oct 07

Les « Variable Length Arrays » (VLA) en C, C++ et d’autres langages Algol-like

Limites, implantation sous-jacente, efficacité.
Évolution du concept et analyse des arguments pro et contra pour C++17.

Contacts: Yves Roggeman

Oct 07

Comparaison des « threads » dans les standards Java 8 et C++14.

Choix des structures, des primitives.
Efficacité, limites, aisance d’usage.

Contacts: Yves Roggeman

Oct 07

Le « shuffling » pseudo-aléatoire

Comparaison de performances théoriques et d’implantations.
Algorithme de Fisher-Yates (dit de Knuth).

Contacts: Yves Roggeman

Oct 07

La génération de permutations

Comparaison de performances théoriques et d’implantations.
Algorithmes de Heap et de Steinhaus–Johnson–Trotter.

Contacts: Yves Roggeman

Oct 07

Comparaison de manipulations de grands entiers.

Implantations de Montgomery versus Toom-Cook, par exemple.
Étude des choix de Gnu MPFR.

Contacts: Yves Roggeman

Mar 09

Side-channel Attack Step-by-Step Tutorial

Cryptography is used in order to ensure security of various IT systems, designer of these systems use encryption algorithms to provide data confidentiality. Nowadays we have some very strong encryption algorithms that could be efficiently implemented in software and in hardware. These algorithms could be used in embedded systems such as microcontrollers (e.g. embedded in a smartcard).

Unfortunately, when a strong and secure algorithm is implemented in a real device the implementation might be insecure which would allow an attacker to extract secret information from the target cryptographic system. There are several types of attacks that exploit physical properties (e.g. power consumption or execution time) of a real physical implementations in order to break the algorithm. These attacks are called side-channel attacks.

The goal of this project is to implement one side channel attack and to create a step-by-step tutorial that goes from the hardware setup and data acquisition to the analysis and the secret key recovery.

There exists several different side-channel attacks, this project proposal holds for all of them and could be chosen by several students (for different types of attacks).

Contacts: Olivier Markowitch and Nikita Veshchikov